Cisco Routers :: Rv120w VPN Tunnel From Internet / Cannot Access Remote Servers
Feb 23, 2012
I have setup a site-to-site VPN tunnel between 2 sites using CISCO rv120w.Everything works fine; any PC on one site can access all systems on the other site and vice-versa.The issue I have is when I start a VPN connection another site on Internet using IPSecuritas.I can initiate a VPN to site 1 and site 2; but when connected, I can only access servers that are located into the same site I'm connected to; I cannot ping the remote site.The Range of IP addresses on the internet during my tests is 192.168.11.0 (I 'm using a Mac)
-Systems with IP 192.168.1.1 and 192.168.10.1 are bridges
-Systems with IP 192.168.1.2 and 192.168.10.2 are CISCO rv120w
We have a RV120W Wireless-N VPN Firewall and we want to configure the router in brigde mode (transparent). Because we have another Firewall, use for filtering and default gateway on the LAN. The ISP provide IP address by DHCP, so we must connect the internet connexion to the WAN interface. But How can we do for connected the RV120W to our firewall? The router mode on the RV120w allows-it to make this configuration?
I'm trying to configure my RV 120W to allow for remote VPN connections by a few salesmen. I tried to set it up through the wizard, but the menu tells me that the Remote Information (IP or FQDN) is assnged when they client connects but I HAVE to put something in there. I tried it with my IP information and can't connect either, but I have a feeling that is my PC's issue with Windows 7 (it just sits on verifying uername and password and then locks up explorer). I don't see anything in the logs about it attempting to connect or anything from my machine- I'm going to work with another but that still doesn't work with the "unknown" IP connection setup.
How does one configure the router so that Internet users can access internal company websites? The only thing that appears is the Cisco router login. Also I need to configure Terminal Services and its not on the list under Service.
I have successfully setup the AnyConnect VPN (connecting to our ASA5510) and have split tunneling configured. My remote users can access inside LAN servers as well as the Internet from their remote location. What I would like to know is is it possible to change the split tunnel and not allow access to the Internet from the remote location but force the remote client to go through the VPN and out our internal edge firewall to the Internet? Basically I need my remote clients to access the Internet but I would like for their Internet traffic to go through the VPN and out our edge firewall. This will allow the same security as if they were sitting in the office.
I had WRT54G2 and recently switched to an RV120W. I have an Internet accessible camera system connected to my router. Before, this worked fine... there is a dns service (DynDNS.com) that is configured as part of the camera setup. I would then just enter [URL] and I would connect to the cameras. I install the new router (RV120W) and I can no longer connect to the cameras. I do not recall any configuring that I had to perform on the old router.
why the RV120W isn't letting me get to the cameras?
I recently bought Cisco RV120W-E V01 and insall it in my home (with firmware 18.104.22.168). I want to establish PPTP conection from my notebook (when I am not at home) and to access (through VPN tunnel) to all hosts in my LAN (with no port restrictions). I configured VPN (PPTP) users and I can establish PPTP tunnel from client to RV120W. My traffic to Internet is going through VPN tunnel to RV120W and then out on Internet, and that is fine. What is not fine is that I can not access to any host on my LAN, and that is the main reason why I configured PPTP tunnel. It is not clear to me, when I am reading admin guide, what I have to configure to allow only my tunnel traffic to reach LAN hosts.
I have a RV120W used to provide VPN access to several industrial devices. Some of these devices are assigned IP address via DHCP in the router. One cannot do DHCP, so it has a self-determined static IP.
The VPN works well for all the devices that are assigned IP's. However, it does not allow me to connect to the device that has a static IP. I can connect to it fine when I am on the LAN or WLAN, but cannot ping it via the VPN.
I have a RV120W Firewall and I've created 3 Vlans. One for Internet Access Computers, One for non-Internet access, one for printers. How can I implement security to keep Internet and non-internet vlan computers from communicating with one anothers? Both computer vlans will need to communicate with printer
I have configured a VPN tunnel between two remote locations using static IP addresses on two RV042 routers. The tunnel seems to work but the problem is that when the two hosts attempt to ping each other only one can successfully ping. One PC with IP address 192.168.1.100 can ping across the network but the second PC with IP address 192.168.2.100 cannot. These are laptops seperate from the intranet used to test the tunnel. Someone had suggested NAT may be the issue so I enabled NAT Transverse on the routers but still no luck. The following is the results from a ping test.
PC 1 ping 192.168.2.1
Pinging 192.168.2.1 with 32 bytes of data: Reply from 192.168.2.1: bytes=32 time=116ms TTL=63 [Code] ......
Users are connecting to Site A (PIX 515e) via Cisco VPN client and can access servers/resources within that site no problem. They cannot access anything within Site B (ASA 5505) however. Devices communicating between Site A and Site B have no issues (have site to site VPN configured). I'm assuming that I'm missing something in configuration - or is it not possible for VPN clients connected to the PIX firewall and access data on the other network?
I have successfully installed and configured VPN Client - Version 5.0.07 to connect to ASA 5510 from a remote workstation. Here is the problem, I cannot ping any of the servers or workstations after I successfully connect. I can ping the ASA 5510 using its internal LAN IP, but no other nodes will respond on the remote LAN.
I have a Cisco RV120W router with 22.214.171.124 firmware. The router drop the internet connections, freeze/timeout in admin interface randomly. How can I determine that this is the router's fault, or if it's the switch / internet access is causing it?
I can ping across the tunnel from the pc's on either end of the tunnel, but I can't ping across the tunnel from the routers. If i ping using the source command using the LAN interface, the ping is successfull.
The reason i need this is for the remote router to be able to lookup the head office server for dns wins and ldap.
I have a site to site VPN between SiteA to SiteB which is working fine. SiteA has an ASA5520 and SiteB Pix501. The ASA5520 is running version 804 with split tunneling. Users connect to SiteA using remote access VPN. Is it possible to setup SiteA ASA5520 so that when users connect to SiteA they can access servers located on SiteB through the tunnel? I know i can setup the Pix501 for remote access VPN but it is located in another country and i don't want to take a chance just incase i lose connectivity.
I'm trying to set up a VPN tunnel between a Linux machine and a RVS4000 at a remote site (served via satellite connection). After many efforts, I finally succeeded (based on Openswan). However, while PINGing is OK, big packets (from the RVS4000 LAN to the Linux box) arrive corrupted.
I lowered the WAN MTU, with no success. What finally did the trick is to lower the MTU at the RVS4000 LAN interface. Since this is not possible via the Web I/F, I did it via telnet ("ifconfig eth0 mtu 1400"). However, this change is lost after router reboot. How can I make the LAN MTU setting permanent?
How would I go about configuring RADIUS based AAA for remote access VPN users? I have an OSX RADIUS server and an ASA 5510
(I want to keep console and SSH using LOCAL, so I keep this: "aaa authentication ssh console LOCAL", right?)What does the rest of the config look like to get RADIUS based AAA for remote access VPN users?
The ASA has one public IP on its outside interface and using PAT to the internet. It only has two interfaces, inside and outside using vlan. I created a IPSec VPN through CLI. My goal is for the remote client to browse the Internet throught tunnel.
Q1: Is it possible?
Q2: The remote side gets connected and has IP from the pool, with is part of inside network. But it cannot ping anything, including the gateway, which is the inside interface. I debug it, it shows the ASA receives the ping packages, but it doesnt send anything back to the client.
My company has a peer to peer network of 10 personal computers without a server. Operating systems from Windows XP to Vista. I've recently installed a Cisco RV120W Wireless-N VPN Firewall. It's configured in DHCP Server Mode with printers/copiers that have static IPs below the DHCP range.
I'm having a problem with certain stations being used for personal networking, shopping, etc. during business hours. Consequently I would like to limit internet access on these stations. However, some internet access is required because of online database software that's an integral part of our business. I've been reading in the Administration Guide about URL Blocking. Would it be possible to give static IPs to certain stations and then limit their internet access to 1 or 2 specific websites?
FYI, I've read about the Trusted Domains and Blocked Keywords but cannot quite understand how to parley this into the solution I need.
I recently cut over from a WRT54G to a RV120W. I am having an issue where I type [URL] (for a server running on my network) in my web browser while on the internal network and it always comes back with the router login page. Basically it is supposed to go out of the router and then come back in on the public IP address and hit that server. There was a function on the WRT54G called "Filter Internet NAT redirection" which when turned off would allow this to happen. I am not seeing a feature like this on the RV120W
I have a requirement to create a site to site vpn tunnel on ASA 5510 from a remote site to my HO, ihave already other site-to-site tunnels are up and running on the ASA.The issue is my remote site has got the network address which falls in one of the subnet used in HO(192.168.10.0/24).My requirement is only My remote site need to accees couple of my servers in HO which is in 192.168.200.0/24 subnet.
I have two offices connected with an IPSEC VPN tunnel using RV220W routers. The Tunnel works fine for local users between the two sites(Site 1:10.0.0.x; site 2 is 10.0.2.x). I have also set up PPTP users for remote access. PPTP users that connect to site 1 cannot access site 2 and vice versa. The PPTP users have no trouble accessing the resources on the site that they connect to. I have tried activating RIP and adding various static routes with no success. If I PPTP connect to site 1 and I tracert to an IP address on site 2 the route goes to the site 1 router and then goes to the internet(connected to the site 1 router) where it stops.
I have configured the ASA 5505 for internet access and outside users to use two servers in the DMZ. Every thing is working fine. When I was configure VPN, I did some mistake I guess, now inside users are not able to access internet. They get an error 405. Thats an error. The request method XXX is inappropriate for the URL /. Thats all we know. Even I am not able to access the server in the DMZ from outside and I get an error : Bad Request - Invalid HeaderThese things just happend after I did some thing on the ASA. I copy and pasted the my old configuration but still insider users are not able to connect to internet and from outside I am not ableto connect to server. The weired thing is that I can user VPN with out any issues. I can connect to vpn but I cant access any internal resources. Even inside users are able to ping internet addresses with out any issue.
I'm running FW 1.2.4 and how to setup Remote Web Access over my IPSEC vpn tunnel. I would like to be able to remotely access these routers and make configuration changes from my main office but I cannot seem to figure out how to get it to work. If I try to access the internal router IP from across the VPN, I cannot. My VPN tunnel is up and operational and I can ping various devices across the tunnel but I cannot access the web management of the router.